You are on page 1of 6

Biologically Inspired Smart Contract: A

Blockchain-Based DDoS Detection System


Xu Han, Rongbai Zhang, Xingzi Liu, Frank Jiang*
Center for Cyber Security Research and Innovation (CSRI)
Deakin University,Geelong, Australi
*Correspondence: Frank.Jiang@deakin.edu.au

Abstract—With the increase of Internet usage, the identifica- [8], the advantages of distributed defence have been proven,
tion and recovery from cyber-attacks become the major concerns such as collaborative intrusion detection systems, which allow
for cyber industries. Therefore, the harm caused by network information from various nodes of the intrusion detection
attacks has caused widespread concern. Distributed Denial of
Service (DDoS) attack is a very common destructive cyber attack. system to interact and collect information [9], but this also
This is a network attack that destroys the network and can cause directly led to the issue of trust between members. Denning
multiple computers to be attacked at the same time, failing to proposed the universal intrusion detection model [10] in 1987,
perform services properly. Therefore, based on the understanding and the intrusion detection system (IDS) has been well applied.
of blockchain structure and DDoS characteristics, a blockchain- However, with the growth of Internet attack technology, this
based DDoS detection model framework is proposed to form
a blockchain-based collaborative detection system. We use the traditional single-point detection is easily bypassed by high
blockchain consortium chain structure to treat all participants attacks [11], so it is especially important to improve the
as part of the private chain in the system. Each participating adaptability of intrusion detection systems [12]. In order to
organization has its own channel, and other organizations cannot enhance the capabilities of intrusion detection systems, some
access its information, thus fully protecting the privacy of each collaborative intrusion detection systems have been designed
participant. Our experimental results show that smart contracts
can detect DDoS data and generate anomalous chains on each to allow information exchange and mutual collection [9]
node. The time required to generate an exception chain and between IDS. Although IDS has existed and developed for
information sharing is very short, which indicates that the system nearly 40 years, it has been facing the problem of data sharing
can protect the privacy of user data. While sharing data in time, [13]. Because participants do not trust each other and involve
good results can be obtained as a collaborative detection system. privacy issues, they are reluctant to share data, which leads to
Index Terms—Blockchain, smart contract, collaborative detec- collaboration. The detection system cannot collect information
tion system, DDoS attack, Fuzzy Neural Network in time, and the collaborative detection system also faces
internal data security problems caused by internal attacks
I. I NTRODUCTION [11]. Once the center receives attacks or tampering, the entire
As the number of assets connected to the internet increases, system will not be able to collect the correct information. In
the impact of distributed denial of service (DDoS) attacks recent years, the industry and academia pay more and more
are increasing. As a highly destructive attack, the destruction attention to encrypted currency. The bitcoin, commonly known
and degradation of its service quality are unpredictable [1]. as the first encrypted currency, the capital market reached 10
The peak bandwidth of DDoS in 2013 has exceeded 300 billion US dollars in 2016 [14]. The blockchain as the core
Gbps [2]. DoS attacks are highly destructive, making services mechanism of Bitcoin shows good application prospects since
reduced or even crashed [1]. As an easy-to-implement and it first proposed in 2008 by Nakamoto and implemented in
powerful technology for attacking Internet resources. Attacks 2009 [15]. From the initial encrypted currency to the current
add DoS issues to many-to-one dimensions, thereby affecting smart contract, blockchain has been applied in many fields
such issues. In the past, there have been some large-scale like economics, software engineering, medicine, Internet of
attacks against well-known Internet sites [3]. Some defensive things and so on. It realizes p2p network transmission through
measures have been proposed to deal with their attacks, but encryption technology and distributed message transmission
the cost of defence is high [4,5], and in the past, DDoS protocol, and ensures data security through the distributed
detection was mostly centralized single-point detection by structure, and realizes data sharing while efficiently process-
analyzing local traffic features [6] which caused the DDoS ing data [16]. As a decentralized, traceable and untouchable
attack could not be effectively defended. Defence measures database, blockchains can work in a centralized environment
against DDoS should be widely deployed to achieve collab- through integrated encryption hashing and digital signature
orative defence by organizing themselves into a collaborative and other core technologies. Its good data sharing features
framework to enable collaboration between different defence and data security protection provide a good infrastructure for
systems [7]. Compared with single-point defence systems the idea of a collaborative defence system. Therefore, we
propose a DDoS detection system based on blockchain. We
Identify applicable funding agency here. If none, delete this. use the hyperledger-fabric as an experimental platform. Using

Authorized licensed use limited to: Sri Sai Ram Engineering College. Downloaded on May 03,2023 at 09:37:34 UTC from IEEE Xplore. Restrictions apply.
the structure of the consortium chain in the blockchain, each in which nodes collaborate during the attack through com-
participant is placed in the private chain under their own munication and collaboration functions to propagate alarms
channels, and its data is not accessed or modified by the and protect legitimate traffic while limiting attack speed.
outside channels. In the smart contract, we use the fuzzy neural Rashidi et al. [19] proposed a DDoS defence mechanism called
network to detect the algorithm and filter the experimental CoFence, which involved dynamic resource allocation devices
results. Once the abnormal data is detected, the attack results in the domain, allowing the network to help each other to
(score) will be uploaded to the public chain to generate an face DDoS attacks through resource sharing. The main idea
abnormal chain, and everyone can use the public chain to of collaborative detection for DDoS is information sharing
access and upload data. The contributions of this study are between system members and resource allocation assistance.
summarized as follows: (1)A blockchain-based collaborative This is a good idea for the detection of distributed denial of
detection DDoS system is proposed. This system can effec- service.
tively solve the problem of data sharing and privacy protection
faced by collaborative detection. Due to the semi-public nature
of the consortium, the privacy of the collaborative detection
participants can be well protected in their own channels, and
when the abnormal data is detected, only the abnormal values
are uploaded to the public chain. Therefore, the privacy of
each participant is still not stolen, and this data sharing is
very efficient. Since the data in the blockchain cannot be
tampered with, participants do not have to worry about data
security issues when uploading and accessing data. At the
same time, due to the traceability of the blockchain itself,
once the internal threat is discovered, the destroyer can be
effectively tracked. (2)Apply biologically inspired scheme to
smart contracts for data training. We use fuzzy neural networks
to detect the data. Due to the self-learning and self-adaptation
of the algorithm itself, the new contract forms a self-evolving
smart contract. After the programming is finished, we will
Fig. 1. An example of the virtual network of collaborative network graph
still send the smart contract to the blockchain network. After [19].
the condition is triggered, the data upload function will be
automatically executed. The user will verify the execution of 2) Distributed Detection System: Collaborative intrusion
the contract and update the database for recording. This paper detection can be used as one of the defences of DDoS. Meng
is organised as follows: Section II summarized the previous et al. [13] pointed out the problems of data sharing and
work. Section III introduces the algorithm model- fuzzy neural trust management and demonstrated the application scenarios
network used in this paper. Section III introduces the system of smart contracts. Since the distributed denial of service
architecture and its working principle. Section IV summarizes (DDoS) defence system itself is not immune to large-scale
and analyze the model output and system output. Section V attacks, Rodrigues, Bocek and Stiller [20] proposed BLOSS-
summarizes this research value and contribution then possible a way to simplify DDoS by deploying collaborative network
directions for future research are described. hardware The new system of attack signalling shows that the
blockchain system has the decentralization feature and the
II. R ELATED W ORK
support of smart contracts, and it is possible to cooperate to
A. Previous Work defend against DDoS cooperative attacks by simplifying the
1) Distributed detection of distributed denial of service: operability and interoperability between Autonomous Systems.
Kumar et al [17] proposed a scheme of using DenS detection in However, for such systems, security and system performance
entropy in an Internet Service Provider (ISP) domain. Seeing are key issues to consider. Gu et al. [21] constructed an alliance
that the previous traffic monitoring and analysis for DDoS is blockchain framework (Figure 2) for malware detection and
carried out by the attacker on a single link of the ISP, this not evidence extraction in mobile devices, shared by the detection
only increases the memory and computing pressure but also federation chain shared by test members and users. The public
makes it vulnerable to attack itself, so the author proposed chain is composed and successfully achieves higher precision.
A distributed method based on traffic distribution between
ISPs and POPs is detected. Chen et al. [18] proposed a new 3) Biologically inspired algorithm: Fuzzy neural network is
distributed traffic flow detection method for detecting DDoS a combination of artificial neural network and fuzzy logic sys-
flood attacks. They use the mutual cooperation between the tem, which can be used for learning, association, recognition
change aggregation tree domain servers in the ISP domain to and information processing. Fuzzy logic theory, as a mathe-
aggregate the flood reports of route reports. Oikonomou et al. matical framework for capturing uncertainty associated with
[7] proposed a collaborative detection model called DefCOM, human cognitive processes (such as thinking and reasoning),

Authorized licensed use limited to: Sri Sai Ram Engineering College. Downloaded on May 03,2023 at 09:37:34 UTC from IEEE Xplore. Restrictions apply.
optimal solution in the fast search process and thus fall into
the local optimum, so Eberhart and Shi [26] will adjust the
inertia weight in the particle swarm optimization algorithm.
The performance of the compression factor is compared under
five benchmark functions, and the conclusion is that the
compression factor is the best result. At the same time, in each
dimension, the maximum speed Vmax is set to be limited to
the dynamic range of the variable Xmax. Shi and Eberhart [27]
proposed implementing a fuzzy system to dynamically adjust
the inertia weight of the Particle Swarm Optimization (PSO)
algorithm. In the experiments in this paper, the reference
functions of three asymmetric initial range settings are used
as tests, and then the fuzzy system is used to test the discount
function. The conclusion is that the fuzzy adaptive particle
swarm algorithm performs well. Especially when it comes to
optimization problems in a dynamic environment.
III. B LOCKCHAIN - BASED D ETECTION BY B IOLOGICAL
I NSPECT S CHEME IN S MART C ONTRAC
Fig. 2. Consortium detection blockchain structure [21].
A. System Introduction
Because DDoS itself has distributed features, single-point
simulates the perceptual and linguistic attributes associated or isolated defence systems are easily bypassed, so distributed
with human cognition through a mathematical form, while collaborative detection is more suitable for its defence. Be-
understanding some The neural network’s learning ability cause the blockchain itself has distributed characteristics and
and self-adaptive ability are very prominent in the inherent the ability to share data and decentralize, it solves the problem
neuronal mechanism of biological species [22]. Thus, a fuzzy of sharing private information and requiring trusted third
neural network model combining fuzzy logic theory and parties to perform collaborative detection. It not only shares
computer neural network is proposed. Applied in different information but also shares information rights. All participants
fields. Zhang et al. [23] argue that malicious code detection is can participate in block access and add information, and all
considered a pattern recognition and can be solved by a neural members are contributing to the system. Our system structure
network that does not require a mathematical description of is shown in Figure 3. All members are in their own private
how the output is functionally dependent on the input to chain. Each chain structure forms a private chain with partic-
estimate the function. Fuzzy logic and neural networks are ipants. Each participant works under his own channel without
complementary, so they propose a fuzzy neural network-based worrying that his organization’s data is accessed or modified
malware detection algorithm and it is proved that this method by outsiders. The rest of the organization cannot access or
can effectively detect malicious binary code. Shalaginov and modify the information without going through its word order.
Franke [24] proposed an optimal fuzzy patch configuration that The public chain structure in the middle is to change the
uses elliptical fuzzy patches to automatically extract parame- location of data storage. Once malicious data is detected, it
ters of Mamdani type rules, based on a new method based on will be uploaded and recorded on the public chain to form an
data X2 testing to estimate rotatable Patch configuration and abnormal chain. All members of the organization can access
Gaussian membership functions to improve the accuracy of and upload it. Data, so each participant does not have to worry
fuzzy neural network detection. The particle swarm algorithm about their privacy issues, and because of the irreversible
proposed by Kennedy is a crowd-based random algorithm that and traceable nature of the blockchain, there is no need to
can be used to optimize based on the principles of social worry about data being tampered with. Single-point attacks
psychology. Particle swarms do not use selection compared do not affect the whole and can be quickly traced back to
to evolutionary algorithms. In the particle swarm algorithm, Internal attackers. Its decentralized structure also poses a major
in general, all subjects are retained from the beginning to the obstacle to the attacker’s target selection. As a collaborative
end of the experiment. The interaction between them leads detection system alliance chain, it can protect privacy while
to iteratively improve the quality of problem solutions over sharing data, and this data sharing is very efficient. All
time [25]. The particle swarm optimization algorithm used members will get warnings and take corresponding measures
as Swarm intelligence (SI) is a random search algorithm when an attack occurs.
that simulates animal foraging behaviour and uses group
collaboration as a basic component. It can be counted as a B. System Architecture
multi-agent optimization system. MAOS). Because the particle Figure 4(taking the private chain and the central public
swarm optimization algorithm has a relatively fast relative chain as an example) shows the architecture of our blockchain-
convergence rate in the early stage, it is easy to miss the based DDoS detection system, which is basically divided

Authorized licensed use limited to: Sri Sai Ram Engineering College. Downloaded on May 03,2023 at 09:37:34 UTC from IEEE Xplore. Restrictions apply.
mechanism. The public chain stores the detected outliers and
their corresponding related information (such as ID) in the
exception chain. In the private chain, each participant has
its own channel, they manage their own data through the
peer-to-peer network structure, others can’t operate, and the
detection of smart contracts is performed on each node. When
malicious data is detected, the smart contract uploads the data
to the public chain, the user will verify the execution of the
program code, then update the database to record the execution
of the contract, and monitor the contract terms to check for
compliance. All the test results will be displayed on the own
chain by the test results of the smart contracts in the member
private chain, which can be stored in the private storage block,
and the detected abnormal results will be stored in the public
Fig. 3. The structure in our blockchain-based DDoS detection system. chain. All members can access it. Since each member of
the system has its own private chain, there is no interaction
between members, and there is no need to consider privacy
leaks and trust issues. Abnormal results on the public chain
are shared, which causes all participants to detect the attack
and understand the attacker’s information in a timely manner
and respond in a timely manner.

C. Data Processing
The data set we used is from the CICDDoS2019
data set shared by the Canadian Cyber Security In-
stitute (https://www.unb.ca/cic/datasets/ddos-2019.html) [28].
We used the DDoS DNS, it includes benign and DDoS DNS
attacks, similar to real data (PCAP), which uses tagged traffic
based on timestamps, source and destination IPs, source and
destination ports, protocols, and attacks. By calculating the
weights, we retain four features (Flow Duration, Flow IAT
Std, Packet Length Std, and Average Packet Size) as input
data.

D. Smart Contracts
In the smart contract, we introduced a fuzzy neural network
model to calculate the data. After many experiments, we
set the learning rate of the model to 0.35 (at this time, the
loss divergence is acceptable, the training progress speed is
normal), input the four-dimensional data for training, and
output the one-dimensional data as the result. For the abnormal
score, we set the model training result to 3.24-3.26. For benign
data, set the model training result as others. After the test
Fig. 4. The architecture of our blockchain-based DDoS detection system. is completed, the smart contract uploads the test results to
all devices, the user will verify the execution of the program
code, then update the database common chain to record the
into four layers. The application layer contains the relevant execution of the contract, and monitor the contract terms to
interfaces in which the application and the user interact with check for compliance.
the application, and this layer does not involve the underly-
ing blockchain technical issues. The contract layer contains IV. O UTCOME E VALUATION
algorithmic mechanisms, script code, and smart contracts. In A DNS attack is an attack that an attacker uses an open
this layer, we add fuzzy neural network algorithms to the DNS resolver to flood a target server and network with a
smart contract to calculate the DDoS data set. In the network large amount of traffic. It essentially takes all possible steps
layer, the private chain adopts a blockchain structure, and to make the DNS system unable to serve normal users. The
each node can communicate through a p2p network, which most common DNS-based DDoS attack is that an attacker
also includes a propagation mechanism and an authentication uses multiple downtimes to send a large number of requests

Authorized licensed use limited to: Sri Sai Ram Engineering College. Downloaded on May 03,2023 at 09:37:34 UTC from IEEE Xplore. Restrictions apply.
to the target DNS server so that the target DNS server cannot
perform normal parsing and response to the request. We
randomly selected 500 data in the DDoS DNS dataset from
the CICDDoS2019 dataset for training. The output is shown in
Figure 6, the average running time of our model to train 500 Fig. 6. TThe FNN output results show in blockchain.
data is 876.2162783ms, and the best performance accuracy is
0.898. For evaluation purposes, the measurement is defined as:
1) If a malicious procedure is considered as malicious after
the test, the result is called TP-True Positive;
2) If a malicious procedure is considered a benign program
after testing, the result is called FN-False Negative; Fig. 7. Generate the abnormal chain.
3) If a benign procedure is considered a benign program
after testing, the result is called TN-True Negative;
4) If a benign procedure is considered a malicious program Figure 6 shows all output data trained by fuzzy neural
after testing, the result is called FP-False Positive. network in blockchain system, all results are shown, and
The precision measurement could be calculated as follows: Figure 7 shows the generation of the abnormal chain with the
abnormal score so that every participates in their own channel
|T P |
precision = (1) could access and upload the abnormal score without leaking
|T P | + |F P | their privacy. The time it takes for our system to store 410
The recall (R) measurement could be calculated as follows: pieces of information is 677.8348ms, and the average time
|T P | required for each piece is 1.6533ms. The expected system is
R= (2) implemented, and the data storage time is acceptable.
|T P | + |F N |
The accuracy (ACC) measurement could be calculated as V. C ONCLUSION
follows: As a highly secure, traceable, non-tamperable, decentral-
|T P | + |T N |
ACC = (3) ized distributed ledger, blockchain technology is designed
|P | + |N | to increase the complexity of evolving universal traffic for
complex, secure, sustainable and efficient services [13]. Since
TP TN FP FN Precision Recall Accuracy DDoS attacks bypass a single or isolated detection system
DATA 359 90 0 51 1 0.8756 0.898 and consider the distributed nature of DDoS, it is easy to
TABLE I
O UTPUT EVALUATION . attack the entire system, so a collaborative detection scheme is
considered here. For collaborative detection, there is usually a
data-sharing problem. Mutual distrust between members leads
It can be seen from Table 1 that the DDoS DNS data to the inability to share data in a timely manner. Based on the
detection performed by the fuzzy neural network in the smart blockchain, we propose a collaborative DDoS detection system
contract has an accuracy rate of 1, a recall rate of 0.8756 and based on the idea of consortium chain. Each member is used
an accuracy of 0.898, which proves that the algorithm can in its own private chain. The information between members
exert a good detection effect in the smart contract. is not shared, and the privacy problem is fully protected. The
abnormal data is stored in the public chain. All members can
access and add data to it, which allows an organization to keep
an eye on the attacker’s information. It is worth mentioning
that the blockchain’s powerful encryption technology ensures
data security in the blockchain and avoids tampering. This
causes the abnormal information in the public chain to not be
tampered with, so members can receive accurate information
without searching a trustable third party.
ACKNOWLEDGMENT
The work has been supported by the Cyber Security Re-
search Centre Limited whose activities are partially funded
by the Australian Government’s Cooperative Research Centres
Fig. 5. The output of the FNN model.
Programme.
Since the efficiency of the neural network depends on the
training data [26], for the inaccuracy of anomaly detection re-
sults (Figure 7), the learning rate and input data characteristics
are the main factors to be considered.

Authorized licensed use limited to: Sri Sai Ram Engineering College. Downloaded on May 03,2023 at 09:37:34 UTC from IEEE Xplore. Restrictions apply.
R EFERENCES the International Fuzzy Systems Association and the European Society for
[1] H. Rahmani, N. Sahli, and F. Kammoun, ”Joint entropy analysis Fuzzy Logic and Technology (IFSA-EUSFLAT-15), 2015: Atlantis Press.
model for DDoS attack detection,” in 2009 Fifth International Conference on [25] J. Kennedy, ”Particle swarm optimization,” pp. 760-766, 2010, Proc.
Information Assurance and Security, 2009, vol. 2, pp. 267-271: IEEE. IEEE Int. Conf. Neural Networks, vol. IV, pp. 1942-1948, 1995.
[2] F. Wang, X. Wang, J. Su, and B. Xiao, ”VicSifter: a collaborative DDoS [26] R. C. Eberhart and Y. Shi, ”Comparing inertia weights and constriction
detection system with lightweight victim identification,” in 2012 IEEE 11th factors in particle swarm optimization,” in Proceedings of the 2000 congress
International Conference on Trust, Security and Privacy in Computing and on evolutionary computation. CEC00 (Cat. No. 00TH8512), 2000, vol. 1, pp.
Communications, 2012, pp. 215-222: IEEE. 84-88: IEEE.
[3] D. Moore, C. Shannon, D. J. Brown, G. M. Voelker, and S. J. A. T. o. C. [27] Y. Shi and R. C. Eberhart, ”Fuzzy adaptive particle swarm optimization,”
S. Savage, ”Inferring internet denial-of-service activity,” vol. 24, no. 2, pp. in Proceedings of the 2001 congress on evolutionary computation (IEEE Cat.
115-139, 2006. No. 01TH8546), 2001, vol. 1, pp. 101-106: IEEE.
[4] A. D. Keromytis, V. Misra, and D. J. I. Josaic. Rubenstein, ”SOS: An [28] X. Qu et al., ”A Survey on the Development of Self-Organizing Maps
architecture for mitigating DDoS attacks,” vol. 22, no. 1, pp. 176-188, 2004. for Unsupervised Intrusion Detection,” pp. 1-22, 2019.
[5] X. Yang, D. Wetherall, and T. Anderson, ”A DoS-limiting network
architecture,” in ACM SIGCOMM Computer Communication Review, 2005,
vol. 35, no. 4, pp. 241-252: ACM.
[6] Z. Han, X. Wang, F. Wang, and Y. Wang, ”Collaborative detection of
DDoS attacks based on chord protocol,” in 2012 IEEE 9th International
Conference on Mobile Ad-Hoc and Sensor Systems (MASS 2012), 2012,
pp. 1-4: IEEE.
[7] G. Oikonomou, J. Mirkovic, P. Reiher, and M. Robinson, ”A framework
for a collaborative DDoS defense,” in 2006 22nd Annual Computer Security
Applications Conference (ACSAC’06), 2006, pp. 33-42: IEEE.
[8] A. Hussain, J. Heidemann, and C. Papadopoulos, ”COSSACK: coordinated
suppression of simultaneous attacks,” in Proceedings of DISCEX, 2003, pp.
2-13.
[9] Y.-S. Wu, B. Foo, Y. Mei, and S. Bagchi, ”Collaborative intrusion
detection system (CIDS): a framework for accurate and efficient IDS,” in
19th Annual Computer Security Applications Conference, 2003. Proceedings.,
2003, pp. 234-244: IEEE.
[10] D. E. Denning, ”An Intrusion-Detection Model,” in IEEE Transactions
on Software Engineering, vol. SE-13, no. 2, pp. 222-232, 1987.
[11] C. Duma, M. Karresand, N. Shahmehri, and G. Caronni, ”A trust-aware,
p2p-based overlay for intrusion detection,” in 17th International Workshop on
Database and Expert Systems Applications (DEXA’06), 2006, pp. 692-697
[12] Z. Ran, ”A model of collaborative intrusion detection system based on
multi-agents,” in 2012 International Conference on Computer Science and
Service System, 2012, pp. 789-792: IEEE.
[13] W. Meng, E. W. Tischhauser, Q. Wang, Y. Wang, and J. J. I. A. Han,
”When intrusion detection meets blockchain technology: a review,” vol. 6,
pp. 10179-10188, 2018.
[14] G. J. C. Hileman, New York, NY, May, ”State of blockchain q1 2016:
Blockchain funding overtakes bitcoin,” vol. 11, 2016.
[15] S. Nakamoto, Bitcoin: A Peer-to-Peer Electronic Cash System, 2008,
[online] Available: https://bitcoin.org/bitcoin.pdf (accessed on September 27,
2019).
[16] S. Yu, K. Lv, Z. Shao, Y. Guo, J. Zou, and B. Zhang, ”A high
performance blockchain platform for intelligent devices,” in 2018 1st IEEE
international conference on hot information-centric networking (HotICN),
2018, pp. 260-261: IEEE.
[17] K. Kumar, R. Joshi, and K. Singh, ”A distributed approach using entropy
to detect DDoS attacks in ISP domain,” in 2007 International Conference
on Signal Processing, Communications and Networking, 2007, pp. 331-337:
IEEE.
[18] Y. Chen, K. Hwang, W. Ku, and D. Systems, ”Collaborative detection
of DDoS attacks over multiple network domains,” vol. 18, no. 12, pp.
1649-1662, 2007.
[19] B. Rashidi, C. Fung, E. I. Bertino, and Security, ”A collaborative ddos
defence framework using network function virtualization,” vol. 12, no. 10,
pp. 2483-2497, 2017.
[20] B. Rodrigues, T. Bocek, A. Lareida, D. Hausheer, S. Rafati, and B.
Stiller, ”A blockchain-based architecture for collaborative DDoS mitigation
with smart contracts,” in IFIP International Conference on Autonomous
Infrastructure, Management and Security, 2017, pp. 16-29: Springer, Cham.
[21] J. Gu, B. Sun, X. Du, J. Wang, Y. Zhuang, and Z. J. I. A. Wang,
”Consortium blockchain-based malware detection in mobile devices,” vol. 6,
pp. 12118-12128, 2018.
[22] M. Gupta, D. J. Rao, and systems, ”On the principles of fuzzy neural
networks,” vol. 61, no. 1, pp. 1-18, 1994.
[23] Y. Zhang, J. Pang, F. Yue, and J. Cui, ”Fuzzy neural network for
malware detect,” in 2010 International Conference on Intelligent System
Design and Engineering Application, 2010, vol. 1, pp. 780-783: IEEE.
[24] A. Shalaginov and K. Franke, ”A new method of fuzzy patches
construction in neuro-fuzzy for malware detection,” in 2015 Conference of

Authorized licensed use limited to: Sri Sai Ram Engineering College. Downloaded on May 03,2023 at 09:37:34 UTC from IEEE Xplore. Restrictions apply.

You might also like